SWE 440 ind Scheduling and Tracking

Based on your previous report and after reviewing the project plan, the CIO has identified several concerns. The CIO has asked you to conduct research on project budgeting and estimation tools. You have been asked to incorporate project estimates techniques using PERT, Analogous, and Delphi into the software development plan. Make sure you also could include a discussion on Metrics as part of the project deliverable.
Also you will be submitting the overall plan, known as the Key Assignment Draft in the upcoming Discussion Board for a peer review. Please make sure your overall plan includes the items mentioned above and these items:
a company name
identify a software application/software development project
determine which software development method you would use and justify your recommendation
provide an outline of the software development project plan based on the development method you selected
also include project oversight considerations such as risk management, scheduling, budget, and configuration management
You just presented the software development plan to the CIO with all of the notes and suggestions incorporated from the previous weeks, for final approval. The CIO has reviewed your software development project plan and found that several components were missing. Your task is to use the financial management software project as your base and prepare a report that describes how each of the following will be used to manage the software development effort.
Scheduling

Discussion – IT Project Management

In addition to your course textbook (chapter 11), utilize the UC library for information and examples.
What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs? Discuss the importance of top management commitment and the development of standards for successful project management. Provide examples to illustrate the importance of these items based on your experience on any type of project. Discuss the unique challenges that an IT project presents.
In your peer responses, be sure discuss your thoughts on project management, your views on project’s attributes, and your thoughts on successful project management. You can take opposing/differing views than your peers but be sure to provide applicable resources as needed. Properly provide examples in your peer responses as well and any additional challenges you see with IT projects.
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the discussion thread. Be sure to use information from your readings and other sources .

Discussion – Information Governance for E-Mail

In addition, the authors provided details to support their position by providing 2013 survey results from 2,400 corporate e-mail users from a global perspective. The results indicated that two-thirds of the respondents stated that e-mail was their favorite form of business communication which surpassed not only social media but also telephone and in-person contact.
With this detail in mind, briefly state why the e-Mail has become a critical component for IG implementation?
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources.

Discussion – The Role of Blockchain in Information Governance

After reading this article (https://www.everteam.com/en/role-of-blockchain-in-information-governance/), discuss at least two ways you foresee blockchain transforming information governance in businesses. Be sure to utilize sources and provide at least one detailed example of your findings.
Provide an outside source (for example, an article from the UC Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
Make an argument concerning the topic.
At least one scholarly source should be used in the discussion. Be sure to use information from your readings and other sources from the UC Library. Use proper citations and references in your post.

CMIT421 VM Scanner Evaluation Background Report

As you are writing your report, you may want to refer back to the CEO’s video in Week 1 to make sure your analysis and recommendations align with the CEO’s priorities and concerns.
You should link your analysis to the kinds of organizational functions and data associated with a transportation company (e.g., protecting order data, customer lists, sales leads, Payment Card Industry (PCI) compliance for processing credit, proprietary software, etc.) and provide your recommendation if Mercury USA should purchase the Nessus tool. This report should be four to six pages in length and include a title/cover page. Include in-text citations and a reference page with three quality sources in a citation style of your choice.
How Will My Work Be Evaluated?
For this assignment, you are asked to provide your supervisor, Judy, with a technical evaluation of a vulnerability scanner. By documenting your results in an effective background report, you are showing how you use your technical knowledge to convey your ideas to others in a professional setting. Your ability to express your findings using the right mix of technical detail in a business context is an important workplace skill.
The following evaluation criteria aligned to the competencies will be used to grade your assignment:
1.3.1: Identify potential sources of information that can be used to develop and support ideas.
1.4.1: Produce grammatically correct material in standard academic English that supports the communication.
10.1.1: Identify the problem to be solved.
12.2.1: Identify systems for the risk assessment.
12.3.1: Select controls.
13.2.1: Evaluate vendor recommendations in the context of organization requirements.
If you haven’t already downloaded it last week, download the VM Scanner Background Report Template now and follow the instructions in the document.

Smart Systems

Smart Cities
Smart Highways
Smart Factories/Warehouses
Smart Data Centers
Smart Homes
Your paper should include a number of topic sections, each covering a technology/idea and providing the following:
1. A heading for the technology
2. A description of the technology
3. The specifications for the technology.
a. What is its purpose?
b. What operations it performs.
c. What are its inputs (resources, interfaces, when used).
d. What are its outputs (interfaces, data).
e. How does the technology integrate within the system.
f. How important is the technology to the system.
Your paper should conclude with a section the describes:
1. The overall system.
2. The system’s overall purpose.
3. The system’s complexity/cost/feasibility.
4. Any constraints or risks found during the research.
5. How the various technologies integrate to accomplish the system goals.
You can use YouTube as an observation method and/or do research for more detail. To receive full credit for this assignment, you must not only document the smart technology/ideas but also document how these smart ideas are integrated as processes within a system (i.e. Smart Cities have a lot of smart tools but these tools are integrated as a smart system used across multiple platforms – infrastructure, transportation, etc.)
You must include at least 10 references with citations. These references do not need to be scholarly and can include videos, websites, blogs, etc. Make sure you include at least one or two scholarly articles as well.

Systems Diagram and Visualization

Create the following UML diagrams to visualize the process of completing the IT project from the previous exercise (providing IT services for a new building):
Use Case diagram
Activity diagram
Communications diagram
Data Flow diagram
Create a Use Case diagram to show all actors and the basic processes above Procurement, Setup, Deployment

Answer the following information technology questions

Use at least two peer reviewed scholarly journal reference for the entire section.
Define best practices in Designing Web Input Forms.
Describe Website Design techniques.
What is GUI?
Define Output Design Methods.
Define how Printed Output is Designed

Section 2:
Explain the difference between data mining and data warehousing?
Discussion Length (word count): At least 200 words
References: At least two peer-reviewed, scholarly journal references.
Section 3:
Data Mining “Anomaly Detection” Assignment
Answer the following questions. No word count required. Make sure the question has been answered thoroughly within the answer. Please ensure to use the Author, YYYY APA citations with any content brought into the assignment. At least two peer-reviewed, scholarly journal references for this entire section.
What are Anomalies/Outliers? And what are some variants of Anomaly/Outlier Detection Problems?
What are some Challenges and Work Assumptions of Anomaly Detection?
Explain the Nearest-Neighbor Based Approach and the different ways to Define Outliers.
Explain the Density-based: LOF Approach.
Provide the General Steps and Types of Anomaly Detection Schemes.

milestone to final project

This will provide you with a chance to practice analyzing your issue or event through these lenses. You will receive feedback on this practice attempt.
To complete this assignment, review the Milestone Two Guidelines and Rubric PDF document.
Prompt
First, review the overviews and resources in Modules One through Three, as well as the Four Lenses document from Module One.
Next, analyze your issue/event through the lens of history, and address the following:
 How does this issue/event interact with the history lens and impact social issues?
 In what ways does the history lens help articulate a deeper understanding of the social issue(s) that inform your issue/event?
Next, analyze your issue/event through the lens of the humanities by exploring the following questions:
 How is this issue/event portrayed creatively in society? What is the message or commentary of this representation?
 How does this representation interact with you in your personal and professional lives?
Note: You are completing two separate analyses: one from history and one from the humanities. You must submit two papers in a single Word document.
Be sure to use evidence from research to support your analysis. Refer to course resources, the LibGuide for this course, as well as any other pertinent
resources to support your responses. Relevant current news sources may be used with instructor approval. Incorporate instructor feedback into your final
project.
The following critical elements must be addressed:
2
I. Lens Analysis: In this section of your assignment, you will analyze your issue/event through two of the four general education lenses.
A. Analyze your issue/event through the lens of history for determining its impact on various institutions. Utilize evidence from research to
support your analysis.
B. Analyze your issue/event through the lens of the humanities for determining its impact on various institutions. Utilize evidence and research to
support your analysis.
Milestone Rubric
Guidelines for Submission: Final Project Milestone Two should be submitted as two papers in a single Word document. The entire submission should be 2–4
pages in length, double-spaced, using 12-point Times New Roman font, one-inch margins. Support your responses with at least two sources for each lens from
the assigned course resources, and/or other scholarly sources located independently via the Shapiro Library. Cite your supporting sources in APA style.
Please note that the grading rubric for this milestone submission is not identical to that of the final project. The Final Project Part One Rubric will include an
additional “Exemplary” category that provides guidance as to how you can go above and beyond “Proficient” in your final submission, as well as additional
elements to address.

Information Technology Week 12 Assistance

The objectives of the COSO framework are closely related to its five components. For this week’s activity, please discuss these five components of the COSO framework. Be sure to include each components’ impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar.
Your paper should meet the following requirements:
Be approximately 2-4 pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.